Server Privilege Management

An Integrated Approach to Server Privilege Management

Lack of control over root or admin passwords, super-user status, or elevated privileges could lead to a damaging breach or audit violation. Although least-privilege enforcement on Tier-1 Windows, Unix and Linux servers is critical, IT leaders are usually unable to control what users can do after authenticating into a server. Traditional solutions are not integrated, requiring a password storage tool to manage access and a separate sudo or least-privilege delegation tool for policy enforcement. This approach is inefficient, complex and expensive – plus it lacks behavioral analysis to identify security anomalies. Only BeyondTrust delivers a truly integrated approach to server privilege management.

Secure Privileged Access to Unix, Linux and Windows Servers

The BeyondTrust PowerBroker Server Privilege Management solution enables IT organizations to define who can access Unix, Linux and Windows servers – and what they can do with that access – via fine-grained policy control. Delivered as an integrated solution, PowerBroker enables organizations to improve security across all servers while simplifying deployments and reducing costs.

The BeyondTrust Server Privilege Management solution is part of the PowerBroker Privileged Access Management platform, which provides visibility and control over all privileged users and accounts in your organization.

Key Capabilities

  • Delegate Unix, Linux and Windows privileges without disclosing root or admin passwords
  • Automatically store, rotate and monitor privileged passwords & SSH keys
  • Monitor sessions and log keystrokes for full audit accountability
  • Bridge Unix and Linux to Active Directory for simplified single sign-on
  • Report on password, user and account behavior

Included Products

PowerBroker for Unix & Linux
Control and audit Unix and Linux root account privileges with centralized management, analytics, reporting, and keystroke logging.

PowerBroker for Windows

Eliminate administrator privileges on physical and virtual Windows servers; grant privileges to applications, not users.

PowerBroker Identity Services

Extend Active Directory authentication & single sign-on to Unix, Linux and Mac.

PowerBroker Password Safe

Discover, manage and monitor any privileged account – admin, service, OS, device, database, application, SSH keys, and cloud and social media accounts.

Retina CS

Perform large-scale, cross-platform vulnerability assessment and remediation, with configuration compliance, patch management and compliance reporting.

PowerBroker Platform

Centralized capabilites include: asset and account discovery; threat and vulnerability intelligence and behavioral analytics; reporting and connectors; and policy and action response.

Key Features

Control and Audit User Activity

Reduce attack surfaces by combining privileged user auditing with onboard password storage and management. When a user checks out a password to invoke a command, fine-grained policy controls limit the security exposure.

Bridge Unix & Linux to Active Directory

Manage heterogeneous server environments by bridging Unix and Linux systems into Active Directory for simplified authentication and greater visibility over user activity.

Reveal Privileged Application and Asset Security

Leverage vulnerability data from Retina and other solutions for a complete picture of privileged application and asset security. No assets are left unprotected, and privilege decisions are made with asset security in mind.

Understand Password, User and Account Behavior

Analyze privileged password, user and account behavior, and assign event Threat Levels based on the user, asset, and application launched. This makes it easier to uncover emerging risks, pinpoint and report on at-risk systems, and take action to proactively eliminate the threat.

Simplify Deployments With a Single Platform

Centrally control privileged access management policies and deployment, and report to multiple stakeholders. PowerBroker simplifies deployments, helps to control costs, and provides a foundation to reduce the evolving risks of privileged access.

Read the complete Data Sheet!

Download Now